<html>
<head>
<meta content="text/html; charset=windows-1252"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
This appears to be a different problem than the crash in SHA. Since
you're seeing a "bad record mac", it appears the TLS handshake has
made it through the ChangeCipherSpec message. Do you know which
cipher suite is being negotiated? If it's AES, it may be worth
trying a 3DES cipher suite. If the issue is in the AES layer, one
of the 3DES cipher suites should work.<br>
<br>
By the way, have you run a 'make test' after building OpenSSL? Are
all the test suites passing? If not, which one is failing?<br>
<br>
<br>
<br>
<div class="moz-cite-prefix">On 04/15/2015 12:26 PM, John Unsworth
wrote:<br>
</div>
<blockquote
cite="mid:CO1PR02MB1584734894D63E75FB5495EF0E50@CO1PR02MB158.namprd02.prod.outlook.com"
type="cite">
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1252">
<meta name="Generator" content="Microsoft Word 15 (filtered
medium)">
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Consolas;
panose-1:2 11 6 9 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0cm;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri",sans-serif;
color:black;
mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:#0563C1;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:#954F72;
text-decoration:underline;}
pre
{mso-style-priority:99;
mso-style-link:"HTML Preformatted Char";
margin:0cm;
margin-bottom:.0001pt;
font-size:10.0pt;
font-family:"Courier New";
color:black;}
span.HTMLPreformattedChar
{mso-style-name:"HTML Preformatted Char";
mso-style-priority:99;
mso-style-link:"HTML Preformatted";
font-family:Consolas;
color:black;
mso-fareast-language:EN-US;}
span.EmailStyle19
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:windowtext;}
span.EmailStyle20
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle21
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle22
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle23
{mso-style-type:personal;
font-family:"Calibri",sans-serif;
color:#1F497D;}
span.EmailStyle24
{mso-style-type:personal-reply;
font-family:"Calibri",sans-serif;
color:#1F497D;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:612.0pt 792.0pt;
margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
<div class="WordSection1">
<p class="MsoNormal"><span style="color:#1F497D">Still exactly
the same crash. And even if these assembly code problems can
be fixed there is still the negotiation error after
compiling with no-asm.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal">4280581268:error:140943FC:SSL
routines:ssl3_read_bytes:sslv3 alert bad record
mac:s3_pkt.c:1456:SSL alert number 20<o:p></o:p></p>
<p class="MsoNormal">4280581268:error:140790E5:SSL
routines:ssl23_write:ssl handshake failure:s23_lib.c:177:<o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D">John.<o:p></o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p></o:p></span></p>
<div>
<div style="border:none;border-top:solid #E1E1E1
1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span
style="color:windowtext;mso-fareast-language:EN-GB"
lang="EN-US">From:</span></b><span
style="color:windowtext;mso-fareast-language:EN-GB"
lang="EN-US"> openssl-users
[<a class="moz-txt-link-freetext" href="mailto:openssl-users-bounces@openssl.org">mailto:openssl-users-bounces@openssl.org</a>]
<b>On Behalf Of </b>John Foley<br>
<b>Sent:</b> 15 April 2015 16:45<br>
<b>To:</b> <a class="moz-txt-link-abbreviated" href="mailto:openssl-users@openssl.org">openssl-users@openssl.org</a><br>
<b>Subject:</b> Re: [openssl-users] OpenSSL 1.0.2
Solaris 32 bit build is broken<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom:12.0pt">Looks like the
crash is in SHA-512 this time, not SHA-1. There's a separate
perl script to generate that assembly code. Try the 1.0.1
version of sha512-sparcv9.pl.<br>
<br>
The output from your rand command is valid. You can use the
-base64 option if you want something more readable.<br>
<br>
<br>
<span style="font-size:12.0pt;mso-fareast-language:EN-GB"><o:p></o:p></span></p>
<div>
<p class="MsoNormal">On 04/15/2015 11:13 AM, John Unsworth
wrote:<o:p></o:p></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<p class="MsoNormal"><span style="color:#1F497D">That seems to
have fixed the crash.</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">-bash-3.00$
./openssl rand 64</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">zMOv@t</span><span
style="color:#1F497D"></span><span style="color:#1F497D">E^Q!\b_YiT-&n߇B+9kx%hRz-bash-3.00$</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">Not sure
about the output though.</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">However
negotiation causes a core:</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">-bash-3.00$
./openssl s_client -connect eos.es.cpth.ie:4250</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">CONNECTED(00000004)</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">depth=0 CN =
jusworth-lt4.eu.cp.net</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">verify
error:num=20:unable to get local issuer certificate</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">verify
return:1</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">depth=0 CN =
jusworth-lt4.eu.cp.net</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">verify
error:num=21:unable to verify the first certificate</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">verify
return:1</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">Segmentation
Fault (core dumped)</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">-bash-3.00$
pstack core</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">core 'core'
of 12587: ./openssl s_client -connect
eos.es.cpth.ie:4250</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">000ed408
sha512_block_data_order (30e538, 30c050, 71a, 30e588,
30c050, 64f98fa7) + 8</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">0009fb30
ssl3_digest_cached_records (2f8ae0, 6, 2f8ea0, 14, 100,
2f8ea0) + 1cc</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">000980ec
ssl3_get_certificate_request (2f8ae0, 2f8ea0, 2f8ea0, 10,
a42e0, 2f8ae0) + 90</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00093ad8
ssl3_connect (2f8ae0, 0, 1180, 1000, 1130, ffffffff) + 6c0</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">000aa2b8
ssl23_get_server_hello (2f8ae0, 16, 3, 3, 2f8ea0, 301638)
+ 648</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">000a9198
ssl23_connect (2f8ae0, 0, 3000, 2b4d64, 2b3d78, 1) + 588</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">000aa60c
ssl23_write (2f8ae0, 2f0270, 0, 3000, ff247c94, a8c10) +
4c</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">0004ee64
s_client_main (0, 0, 1, 2b4d64, 2f8ae0, 2f4280) + 7374</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">0001328c
do_cmd (2eb3c8, 3, ffbffad0, 2b4638, 13e64, 2b3d78) + b8</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00012f08
main (4, ffbffacc, 2eb3c8, 29fc00, 2b3d78, 2b49dc) +
3a4</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00012a08
_start (0, 0, 0, 0, 0, 2b3d78) + 108</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">Regards,</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">John</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<div>
<div style="border:none;border-top:solid #E1E1E1
1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span
style="color:windowtext;mso-fareast-language:EN-GB"
lang="EN-US">From:</span></b><span
style="color:windowtext;mso-fareast-language:EN-GB"
lang="EN-US"> openssl-users [<a moz-do-not-send="true"
href="mailto:openssl-users-bounces@openssl.org">mailto:openssl-users-bounces@openssl.org</a>]
<b>On Behalf Of </b>John Foley<br>
<b>Sent:</b> 15 April 2015 15:10<br>
<b>To:</b> <a moz-do-not-send="true"
href="mailto:openssl-users@openssl.org">openssl-users@openssl.org</a><br>
<b>Subject:</b> Re: [openssl-users] OpenSSL 1.0.2
Solaris 32 bit build is broken</span><o:p></o:p></p>
</div>
</div>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom:12.0pt">How about
the ./openssl sha1 command? Does that bomb too?<br>
<br>
It might be interesting to copy
crypto/sha/asm/sha1-sparcv9.pl from the 1.0.1 source into
the 1.0.2 source. Then clean, configure, compile and try
again. There were changes to this file between 1.0.1 and
1.0.2. Perhaps a bug was introduced. I'm assuming this
script generates the SHA source for your target platform. <br>
<br>
<br>
<br>
<o:p></o:p></p>
<div>
<p class="MsoNormal">On 04/15/2015 09:56 AM, John Unsworth
wrote:<o:p></o:p></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<p class="MsoNormal"><span style="color:#1F497D">core 'core'
of 24243: ./openssl rand 64</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">000e9ce8
sha1_block_data_order (2ec298, 2ec2f4, 4, ffbfe018,
ffbfe01c, 44) + 8</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00226160
ssleay_rand_add (ffbfe114, 1, 20, ffbfdfec, 0, 14) + 530</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00227048
RAND_poll (4, ffbfe100, ffbfe120, ffbfe120, 2c0650,
2c0644) + 38c</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00226c00
ssleay_rand_status (c734, 0, 2b9f7c, 2c05cc, 2a0e70,
13000) + 138</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00065eb4
app_RAND_load_file (ffbfe418, 2d5238, 0, 2800, 0, 1) +
88</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00077cb8
rand_main (0, 0, ff242b30, 0, 0, 0) + 4b8</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">0001328c
do_cmd (2eb4e8, 2, ffbffae0, 2b4728, 13e64, 2b3e98) +
b8</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00012f08
main (3, ffbffadc, 2eb4e8, 2a0000, 2b3e98, 2b4afc) +
3a4</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">00012a08
_start (0, 0, 0, 0, 0, 2b3e98) + 108</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">Regards,</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">John.</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<div>
<div style="border:none;border-top:solid #E1E1E1
1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span
style="color:windowtext;mso-fareast-language:EN-GB"
lang="EN-US">From:</span></b><span
style="color:windowtext;mso-fareast-language:EN-GB"
lang="EN-US"> openssl-users [<a
moz-do-not-send="true"
href="mailto:openssl-users-bounces@openssl.org">mailto:openssl-users-bounces@openssl.org</a>]
<b>On Behalf Of </b>John Foley<br>
<b>Sent:</b> 15 April 2015 13:31<br>
<b>To:</b> <a moz-do-not-send="true"
href="mailto:openssl-users@openssl.org">openssl-users@openssl.org</a><br>
<b>Subject:</b> Re: [openssl-users] OpenSSL 1.0.2
Solaris 32 bit build is broken</span><o:p></o:p></p>
</div>
</div>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom:12.0pt">Do you see
the same stack trace when simply using the random number
generator:<br>
<br>
./openssl rand 64<br>
<br>
What if you simply use SHA1:<br>
<br>
./openssl sha1 <somefile><br>
<br>
<br>
<br>
<br>
<o:p></o:p></p>
<div>
<p class="MsoNormal">On 04/14/2015 12:17 PM, John Unsworth
wrote:<o:p></o:p></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<p class="MsoNormal"><span style="color:#1F497D">Is no-one
interested at all about this problem? Or do I need to
send it to another place?</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">Regards,</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">John.</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<div>
<div style="border:none;border-top:solid #E1E1E1
1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span
style="mso-fareast-language:EN-GB" lang="EN-US">From:</span></b><span
style="mso-fareast-language:EN-GB" lang="EN-US">
openssl-users [<a moz-do-not-send="true"
href="mailto:openssl-users-bounces@openssl.org">mailto:openssl-users-bounces@openssl.org</a>]
<b>On Behalf Of </b>John Unsworth<br>
<b>Sent:</b> 10 April 2015 14:54<br>
<b>To:</b> <a moz-do-not-send="true"
href="mailto:openssl-users@openssl.org">openssl-users@openssl.org</a><br>
<b>Subject:</b> Re: [openssl-users] OpenSSL 1.0.2
Solaris 32 bit build is broken</span><o:p></o:p></p>
</div>
</div>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">I have
compiled 1.0.1m in the same way and that works fine
using asm.</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">John.</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"></span><o:p></o:p></p>
<div>
<div style="border:none;border-top:solid #E1E1E1
1.0pt;padding:3.0pt 0cm 0cm 0cm">
<p class="MsoNormal"><b><span
style="mso-fareast-language:EN-GB" lang="EN-US">From:</span></b><span
style="mso-fareast-language:EN-GB" lang="EN-US">
openssl-users [<a moz-do-not-send="true"
href="mailto:openssl-users-bounces@openssl.org">mailto:openssl-users-bounces@openssl.org</a>]
<b>On Behalf Of </b>John Unsworth<br>
<b>Sent:</b> 10 April 2015 12:21<br>
<b>To:</b> <a moz-do-not-send="true"
href="mailto:openssl-users@openssl.org">openssl-users@openssl.org</a><br>
<b>Subject:</b> [openssl-users] OpenSSL 1.0.2
Solaris 32 bit build is broken</span><o:p></o:p></p>
</div>
</div>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">I have an application that runs quite
happily using OpenSSL 1.0.1h on Solaris 32 bit. I want
to upgrade but both 1.0.2 and 1.0.2a cause problems.<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">1 When building 1.0.2 using<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">./Configure solaris-sparcv9-cc
no-shared -m32 -xcode=pic32 -xldscope=hidden<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">openssl s_client crashes on start:<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">-bash-3.00$ ./openssl s_client
-connect eos.es.cpth.ie:4250<o:p></o:p></p>
<p class="MsoNormal">Segmentation Fault (core dumped)<o:p></o:p></p>
<p class="MsoNormal">-bash-3.00$ pstack core<o:p></o:p></p>
<p class="MsoNormal">core 'core' of 468: ./openssl
s_client -connect eos.es.cpth.ie:4250<o:p></o:p></p>
<p class="MsoNormal">000e9ce8 sha1_block_data_order
(2ed490, 2ed4ec, 4, ffbfebc0, ffbfebc4, 44) + 8<o:p></o:p></p>
<p class="MsoNormal">00226140 ssleay_rand_add (ffbfecbc,
1, 20, ffbfeb94, 0, 14) + 530<o:p></o:p></p>
<p class="MsoNormal">00227028 RAND_poll (4, ffbfeca8,
ffbfecc8, ffbfecc8, 2c0630, 2c0624) + 38c<o:p></o:p></p>
<p class="MsoNormal">00226be0 ssleay_rand_status (c734, 0,
2b9f5c, 2c05ac, 2a0e50, 13000) + 138<o:p></o:p></p>
<p class="MsoNormal">00065eb4 app_RAND_load_file
(ffbfefc0, 2d5218, 1, 2800, 0, 1) + 88<o:p></o:p></p>
<p class="MsoNormal">0004d784 s_client_main (0, c00, 0,
c00, 2b4adc, 2f4380) + 5c94<o:p></o:p></p>
<p class="MsoNormal">0001328c do_cmd (2eb4c8, 3,
ffbffa88, 2b4738, 13e64, 2b3e78) + b8<o:p></o:p></p>
<p class="MsoNormal">00012f08 main (4, ffbffa84,
2eb4c8, 2a0000, 2b3e78, 2b4adc) + 3a4<o:p></o:p></p>
<p class="MsoNormal">00012a08 _start (0, 0, 0, 0, 0,
2b3e78) + 108<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">2 So I then rebuilt adding no-asm
flag. It manages to connect but negotiation fails with
an error:<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">4280581268:error:140943FC:SSL
routines:ssl3_read_bytes:sslv3 alert bad record
mac:s3_pkt.c:1456:SSL alert number 20<o:p></o:p></p>
<p class="MsoNormal">4280581268:error:140790E5:SSL
routines:ssl23_write:ssl handshake
failure:s23_lib.c:177:<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">This is against the server that is
still running 1.0.1h and can be successfully connected
with openssl built with 1.0.1h.<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">Note that the 64 bit build seems to
work perfectly. Unfortunately for historical reasons we
need to use the 32 bit version.<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">The 32 bit builds that we use on
Windows and Linux also work perfectly. Is it something
to do with byte order?<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal">Regards,<o:p></o:p></p>
<p class="MsoNormal">John.<o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal"><o:p></o:p></p>
<p class="MsoNormal"><span style="font-size:12.0pt"><br>
<br>
<br>
<br>
<br>
</span><o:p></o:p></p>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>openssl-users mailing list<o:p></o:p></pre>
<pre>To unsubscribe: <a moz-do-not-send="true" href="https://mta.openssl.org/mailman/listinfo/openssl-users">https://mta.openssl.org/mailman/listinfo/openssl-users</a><o:p></o:p></pre>
</blockquote>
<p class="MsoNormal"><span style="font-size:12.0pt"></span><o:p></o:p></p>
<p class="MsoNormal"><span style="font-size:12.0pt"><br>
<br>
<br>
<br>
</span><o:p></o:p></p>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>openssl-users mailing list<o:p></o:p></pre>
<pre>To unsubscribe: <a moz-do-not-send="true" href="https://mta.openssl.org/mailman/listinfo/openssl-users">https://mta.openssl.org/mailman/listinfo/openssl-users</a><o:p></o:p></pre>
</blockquote>
<p class="MsoNormal"><span style="font-size:12.0pt"></span><o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman",serif;mso-fareast-language:EN-GB"><br>
<br>
<br>
<o:p></o:p></span></p>
<pre>_______________________________________________<o:p></o:p></pre>
<pre>openssl-users mailing list<o:p></o:p></pre>
<pre>To unsubscribe: <a moz-do-not-send="true" href="https://mta.openssl.org/mailman/listinfo/openssl-users">https://mta.openssl.org/mailman/listinfo/openssl-users</a><o:p></o:p></pre>
</blockquote>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman",serif;mso-fareast-language:EN-GB"><o:p></o:p></span></p>
</div>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
openssl-users mailing list
To unsubscribe: <a class="moz-txt-link-freetext" href="https://mta.openssl.org/mailman/listinfo/openssl-users">https://mta.openssl.org/mailman/listinfo/openssl-users</a>
</pre>
</blockquote>
<br>
</body>
</html>